• Title/Summary/Keyword: protection level

Search Result 2,215, Processing Time 0.027 seconds

Protection Scheme Guaranteeing the Recovery Time Defined in Service Level Agreement in WDM Mesh Networks (WDM Mesh 네트워크에서 SLA 복구시간을 만족시키는 보호기법)

  • Hong, Kiwon;Yim, Taihyong;Kyung, Yeonwoong;Park, Jinwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.41-43
    • /
    • 2014
  • In this paper, we proposed a new protection scheme of the WDM mesh networks that can utilize the network resources efficiently while satisfying with the recovery time defined in the SLA (service level agreement). The protection scheme and the backup path are selected based on the comparison of the expected protection time with the SLA recovery time. The superior performance of the proposed protection scheme was demonstrated by comparing with ones of the existing protection schemes.

Analysis of the Protective Distance of Low-Voltage Surge Protective Device(SPD) to Equipment (저압용 서지 보호 장치(SPD)의 보호 거리 해석)

  • Lee, Jung-Woo;Oh, Yong-Taek
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.4
    • /
    • pp.28-34
    • /
    • 2012
  • Installing surge protection devices for a low-voltage system is important to ensure the survival of electric or electronic devices and systems. If surge protection devices (SPD) are installed without consideration of the concept of lightning protection zones, the equipment to be protected might be damaged despite the correct energy coordination of SPDs. This damage is induced by the reflection phenomena on the cable connecting an external SPD and the load protected. These reflection phenomena depend on the characteristics of the output of the external SPD, the input of the loads, and the cables between the load and the external SPD. Therefore, the SPD has an effective protection distance under the condition of the specific load and the specific voltage protection level of SPD. In this paper, PSCAD/EMTDC software is used to simulate the residual voltage characteristics of SPD Entering the low-voltage device. And by applying a certain voltage level, the effective protection distances of SPD were analyzed according to the each load and length of connecting cable, and the effectiveness of SPD were verified.

Influences of the Length of Connecting Leads on the Energy Coordination in Coordinated SPD Systems (협조된 SPD시스템에서 접속선의 길이가 에너지협조에 미치는 영향)

  • Lee, Bok-Hee;Shin, Hee-Kyung
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.6
    • /
    • pp.91-98
    • /
    • 2014
  • For the purpose of designing and applying the optimum surge protection scheme, multi-stage coordinated surge protective device(SPD) system is suitable to successfully fulfill its tasks; first, to divert a large amount of the transient energy, second, to clamp the overvoltage to the level below the withstand impulse voltage of the equipment to be protected. The length of SPD connecting leads shall be as short as possible. Long connecting leads will degrade the protection effect of SPDs. In this paper, the influences of the length of connecting leads on the energy sharing in a coordinated SPD system were investigated experimentally, and the simulation of determining the energy sharing and protection voltage level of each SPD depending on the length of connecting leads was carried out by using P-spice program. It was confirmed that the protection voltage level and energy sharing in coordinated SPD systems are strongly influenced by the length of connecting leads.

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

Guaranteed GNSS-based Road Charging Applications through User-Level Integrity

  • Mark, Audrey;Schortmann, Joaquin Cosmen;Olague, Miguel Angel Martinez;Merino, Miguel Romay
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.77-82
    • /
    • 2006
  • Integrity plays a fundamental role in the feasibility of 'liability critical' applications. Road charging, e.g. road tolling in urban zones or on highways, represents a series of liability critical applications where a guarantee in integrity could be a true enabler: being the mechanism that prevents the incorrect charging of users and enabling the advancement of these applications using GNSS such as Galileo and EGNOS that provide integrity mechanisms. However, the integrity of the end user position is not guaranteed by the EGNOS and Galileo integrity services alone as provided. Algorithms have been developed to supply a guarantee on the performance attainable at the user level through the provision of a horizontal protection level that responds to local user conditions such as multipath or interference. In addition, an application has been developed that implements road charging mechanisms based on the availability of user-level integrity. Results obtained show that the user-level integrity algorithms provided the required level of integrity guarantee and granularity of the horizontal protection levels necessary for executing urban and rural (highway) road charging. In addition, the road charging application developed shows that the current application domain requirements can be met through the provision of guaranteed integrity and that further reductions in the horizontal protection levels along with increased signal availability will enable future road charging modalities.

  • PDF

Protection Characteristics of Two-Stage Cascade SPD Systems (2단 종속 SPD시스템의 보호특성)

  • Lee, Bok-Hee;Shin, Hee-Kyung
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.5
    • /
    • pp.95-103
    • /
    • 2013
  • Protection of the electrical and electronic equipment against surges in low voltage AC power distribution systems is based on wide applications of surge protective devices(SPDs). Cascade application of SPDs located at the service entrance of a building and near sensitive equipment is intended to ensure the optimal voltage protection level and energy sharing among cascade SPDs. In this paper, when surges impinge at the service entrance of the building of interest, the protection characteristics of two-stage cascade SPD systems were investigated. The influence of the distance between the upstream and downstream SPDs on the voltage protection level and energy sharing of the two-stage cascade SPD systems were analyzed experimentally. It was found that the energy sharing of two-stage cascade SPD systems strongly depends on the distance between the two SPDs and the component of SPD. As the distance between the two SPDs increases, the energy absorbed by the upstream SPD increases while the energy absorbed by the downstream SPD decreases. Consequently, it is desirable to select the upstream and downstream SPDs having the proper energy capability with due consideration of the distance between the two SPDs.

Mobile Payment Use in Light of Privacy Protection and Provider's Market Control

  • Mohammad Bakhsh;Hyein Jeong;Lingyu Zhao;One-Ki Daniel Lee
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.257-276
    • /
    • 2021
  • This study investigates the factors that facilitate or hinder people to use mobile payment, especially drawing upon the theoretical perspectives on individual's privacy protection motivation and perceived market condition. Survey data (n = 200) were collected through a web-based platform and used to test a theoretical model. The results show that one's privacy protection power is formed by various individual and technological factors (i.e., perceived data exposure, self-efficacy, and response efficacy), and in turn it determines his/her intention to use mobile payment. Moreover, the relationship between privacy protection power and mobile payment use is conditional on the perceived market control by the service provider - with a perception of the high level of provider's market control, one uses mobile payment regardless of his/her privacy protection power, while under the low level of provider's market control, the decision depends on the degree of privacy protection power. The findings would help our understanding of why some people are more susceptible to mobile payment and others are not.

Interns′ Evaluation and Satisfaction with their Consumer Counseling Internship Programs (소비자상담 현장실습에 대한 실습생의 평가 및 실습만족도)

  • 허경옥
    • Journal of Families and Better Life
    • /
    • v.22 no.5
    • /
    • pp.293-302
    • /
    • 2004
  • This study investigated the internship experiences of female college students who have participated in consumer counseling programs. The factors that determine interns' counseling time and interns' level of satisfaction with the programs were examined. Major results of this study are summarized in the following. First, interns' time spent on counseling consumers was the longest for the program at the Korean Consumer Protection Board, followed by the programs at consumer agencies and firms. The time spent on counseling by interns was shorter when there was l) a larger number of employees; 2) a smaller proportion of female employees: 3) a larger number of counseling rooms and a higher the frequency of counseling at the agency; and 4) a lower evaluation on the work performance of the counseling agency and the employees. Second, the level of utilization of interns was the highest in consumer agencies, followed by the Korean Consumer Protection Board. When all employees were female and the evaluated level of work performance of the counseling agency and employees was high, the level of intern utilization was also high. Third, the evaluated level of work performance was the highest at the Korean Consumer Protection Board, and interns' satisfaction with the internship program was the highest with the consumer agencies and the Korean Consumer Protection Board. Fourth, interns were highly satisfied with the program when the level of intern utilization was high and the agency's operation was evaluated as good.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.